Charlie Litzsinger
August 23rd 07, 05:05 AM
Brothers' **********
It just never stopped.
Here are three examples from category:
o Working on another job while within the firm
********** begin excerpt from 'Corruption at Salomon Brothers' **********
************************************************** *****************************
************************************************** *****************************
************************************************** *****************************
This report concerns Internet public wire traffic of XXX XXXXXX XXXXXX.
Internet traffic is monitored for security and compliance purposes.
----------------------------------
Security Incident Report 10/25/96
Raymond Brock: working on another
job while within XXX XXXXXX XXXXXX
----------------------------------
On Fri Oct 25 Raymond Brock sent out an email regarding "a demo" that
triggered a secondary search of his traffic. The results show he is
working on a project outside XXXXXX, with the aid of XXXXXX systems.
This report consists of:
#1 - detailed summary of findings
#2 - Brock's resume
#3 - email between Brock and his partners
#4 - sorted-unique list of sites/URLs visited
#5 - one full days WWW log
Prepared by Guy on 10/28/96.
************************************************** *****************************
************************************************** *****************************
************************************************** *****************************
[snip]
> Back in April, Raymond Brock mailed out his resume, stating
> these accomplishments for XXX XXXXXX XXXXXX:
>
> o front-end trading system
> o portfolio system daily processing
> o developed interfaces to monitor and feed trade system
>
[snip]
> Now, according to his email, he is doing a
It just never stopped.
Here are three examples from category:
o Working on another job while within the firm
********** begin excerpt from 'Corruption at Salomon Brothers' **********
************************************************** *****************************
************************************************** *****************************
************************************************** *****************************
This report concerns Internet public wire traffic of XXX XXXXXX XXXXXX.
Internet traffic is monitored for security and compliance purposes.
----------------------------------
Security Incident Report 10/25/96
Raymond Brock: working on another
job while within XXX XXXXXX XXXXXX
----------------------------------
On Fri Oct 25 Raymond Brock sent out an email regarding "a demo" that
triggered a secondary search of his traffic. The results show he is
working on a project outside XXXXXX, with the aid of XXXXXX systems.
This report consists of:
#1 - detailed summary of findings
#2 - Brock's resume
#3 - email between Brock and his partners
#4 - sorted-unique list of sites/URLs visited
#5 - one full days WWW log
Prepared by Guy on 10/28/96.
************************************************** *****************************
************************************************** *****************************
************************************************** *****************************
[snip]
> Back in April, Raymond Brock mailed out his resume, stating
> these accomplishments for XXX XXXXXX XXXXXX:
>
> o front-end trading system
> o portfolio system daily processing
> o developed interfaces to monitor and feed trade system
>
[snip]
> Now, according to his email, he is doing a